Blogs

About this blog

Welcome to the Security and Risk Management Blog, where you can read the perspectives from security and risk management experts. This Blog provides insights into the security and risk management solution, as well as technical details about specific IBM pr

Recent tweets

Data loss is getting worse. Businesses and other organizations are losing their content 24/7 throughout the globe. Cyberattacks on elections, intelligence agencies and the highest government levels make the news every day. Attacks on big business – Target, Sony and more – threaten the identities of employees, customers and stakeholders. Yet, small businesses have become the easiest data bank to rob. The Size Of The Problem What you see in recent research is some confusion about the size of the problem, but it's bad. And,... [More]

2FA Architecture — The threat to privacy of modern Internet Are we secured with multiple layers of security? There is a huge initiative from industry leaders to double secure user account in order to regain access in case of lost password. That’s perfectly fine. It helps you recover credentials, but this study shows it opens a hole that might be one of the largest security and privacy threats. Both private users and enterprises employs services such as Google, Facebook, Twitter, LinkedIN and others and give trust to... [More]

“Cybersecurity” has become an increasingly vague and generalized term. The concept of cybersecurity encompasses every angle from which infiltrators and others with malicious intentions can make their mark. From cyber espionage and hacking electronic medical records to keylogging and trojan viruses, the term cybersecurity does not adequately capture the extent to which threats have evolved. But there is some good news: 2017 has seen new technologies prove to be effective solutions. Most important, we're seeing new philosophies... [More]

IBM wants to increase the value of your existing products by bringing you more content through the Integrated Service Management Library . Please take a moment to help us understand what kind of content would be most useful to you by answering this very brief survey.

Don’t miss
the next Tivoli User Community webcast: IBM’s Next Generation of IAM solutions
– What You Need to Know Now on December 12, 2012 at 11:00 am ET, USA. Reserve Your Webcast Seat Now Overview: In Q4 2012, IBM Security completely
revamped the Identity and Access Management portfolio to address today’s
advanced security threats. Familiar products such as Tivoli Identity Manager
and Tivoli Access Manager for e-business have new IBM Security names and
exciting new capabilities. Plus we’ve announced brand new solutions... [More]

There was a time,
when logging in to your bank account was a simple matter of entering a user ID,
entering a password, and accessing your account. Similarly, getting
cash from an ATM, just entailed inserting your card, entering your PIN code,
and grabbing the cash. Not any more. When you access your
bank’s web page, something horrible, called ‘malware’, sits on your PC,
remembering every character you type, and sending them all to its sociopathic
owner, so that he can later rob you. When you visit your ATM, a hidden camera
records the... [More]